hashlookup / hashlookup-forensic-analyserLinks
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
☆126Updated last year
Alternatives and similar repositories for hashlookup-forensic-analyser
Users that are interested in hashlookup-forensic-analyser are comparing it to the libraries listed below
Sorting:
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆132Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- A collection of tips for using MISP.☆74Updated 8 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- ☆94Updated 3 weeks ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- Collection of Jupyter Notebooks by @fr0gger_☆175Updated 2 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- TAPIR is a multi-user, client/server, incident response framework☆45Updated 3 years ago
- Digital Forensics Artifacts Knowledge Base☆86Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆84Updated 3 months ago
- An open source platform to support analysts to organise their case and tasks☆100Updated last week
- Cisco Orbital - Osquery queries by Talos☆134Updated last year
- Python library for threat intelligence☆87Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆39Updated 4 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 2 months ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- a common schema for internet-connected service discovery 🔎 📚☆19Updated last month
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆45Updated 3 years ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆109Updated last week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆268Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Website for ail-typo-squatting library☆63Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated last week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆113Updated 2 years ago